Secure Access on Aws with Ztna 20 Prt044

Title

AWS re:Invent 2022 - Secure access on AWS with ZTNA 2.0 (PRT044)

Summary

  • Don Meyer from Palo Alto Networks discusses the evolution of Zero Trust Network Access (ZTNA) and introduces ZTNA 2.0.
  • ZTNA 1.0, designed in 2010, is outdated for today's hybrid workforces and application landscapes.
  • Traditional ZTNA solutions have limitations, such as a one-time trust verification and lack of in-depth application understanding.
  • ZTNA 2.0 addresses these issues by providing continuous trust verification, understanding applications at a granular level, and inspecting threats throughout a session.
  • Palo Alto Networks' Prisma Access product embodies ZTNA 2.0 principles, offering cloud-delivered security for any user, device, and application.
  • Prisma Access is now available in the AWS marketplace, providing protection for AWS VPCs, Kubernetes, and containers with the same ZTNA 2.0 outcomes.

Insights

  • The shift to hybrid work environments and cloud-based applications has increased the attack surface, necessitating a more robust security model like ZTNA 2.0.
  • ZTNA 2.0's continuous trust verification and threat inspection address the dynamic nature of security threats, where user behavior, device posture, and application vulnerabilities can change during a session.
  • Understanding applications at a granular level is crucial for implementing the principle of least privilege, ensuring users have access only to the necessary functions within an application.
  • The integration of ZTNA 2.0 with AWS services through Prisma Access suggests a strong partnership between Palo Alto Networks and AWS, aiming to enhance cloud security for AWS customers.
  • The availability of Prisma Access in the AWS marketplace indicates a trend towards streamlined procurement and deployment of security solutions within the AWS ecosystem.